Follow Dark Reading:
 January 06, 2018
LATEST SECURITY NEWS & COMMENTARY
The Nightmare Before Christmas: Security Flaws Inside our Computers
How an Intel design decision with no review by industry security consultants led to one of the biggest vulnerabilities in recent history.
LockPoS Malware Sneaks onto Kernel via new Injection Technique
"Alarming evolution" of Flokibot bypasses antivirus software and was likely built by a group of advanced attackers, researchers say.
New Adware Discovered in 22 Apps in Google Play
The 'LightsOut' adware is found is flashlight and utility apps, which have been downloaded between 1.5 million to 7.5 million times.
Breach of India's Biometric Database Puts 1 Billion Users at Risk
The Tribune reports that hackers gained access to users' names, addresses, phone numbers, and other PII.
MORE NEWS & COMMENTARY
HOT TOPICS
Vendors Rush to Issue Security Updates for Meltdown, Spectre Flaws
Apple says all Mac and iOS systems are affected by new side-channel attack vulnerabilities.

Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

17 Things We Should Have Learned in 2017, but Probably Didn't
The worm has returned and the Yahoos have all been exposed, but did 2017 teach us any genuinely new lessons we shouldn't already have known?

MORE
IN CASE YOU MISSED IT

8 Steps for Building an IT Security Career Path Program
A cybersecurity career-path program can help with talent retention and recruitment.
The Cybersecurity 'Upside Down'
There is no stranger thing than being breached. Here are a few ways to avoid the horror.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Is a Good Offense the Best Defense Against Hackers?
The proposed Active Cyber Defense Certainty (ACDC) Act has its pros and cons. But it's not the only option for protecting your company's digital assets.

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

FEATURED REPORTS
  • [Strategic Security Report] Cloud Security's Changing Landscape

    The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.